acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Sudafed Security Trade-Off
From Schneier on Security

The Sudafed Security Trade-Off

This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine: Now, personally, I sincerely...

SSL Traffic Analysis on Google Maps
From Schneier on Security

SSL Traffic Analysis on Google Maps

Interesting.

Trust Requires Transparency
From Schneier on Security

Trust Requires Transparency

Adam Shostack explains to Verisign that trust requires transparency. This is a lesson Path should have learned.

<i>Liars and Outliers</i> Update
From Schneier on Security

Liars and Outliers Update

Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?
From Schneier on Security

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?

Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...

Friday Squid Blogging: Squid's Beard
From Schneier on Security

Friday Squid Blogging: Squid's Beard

It's an acoustic bluegrass band. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Captchas
From Schneier on Security

Captchas

Funny.

Securing iPads for Exams
From Schneier on Security

Securing iPads for Exams

Interesting blog post about locking down an iPad so students can take exams on them.

Security Implications of "Lower-Risk Aircraft"
From Schneier on Security

Security Implications of "Lower-Risk Aircraft"

Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security. Abstract: Since...

Solving the Underlying Economic Problem of Internet Piracy
From Schneier on Security

Solving the Underlying Economic Problem of Internet Piracy

This essay is definitely thinking along the correct directions.

Error Rates of Hand-Counted Voting Systems
From Schneier on Security

Error Rates of Hand-Counted Voting Systems

The error rate for hand-counted ballots is about two percent. All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...

The Failure of Two-Factor Authentication
From Schneier on Security

The Failure of Two-Factor Authentication

In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...

Friday Squid Blogging: Clothing that Keeps an Exercise Journal
From Schneier on Security

Friday Squid Blogging: Clothing that Keeps an Exercise Journal

It's called Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

The Problems of Too Much Information Sharing
From Schneier on Security

The Problems of Too Much Information Sharing

Funny. Fake, but funny.

VeriSign Hacked, Successfully and Repeatedly, in 2010
From Schneier on Security

VeriSign Hacked, Successfully and Repeatedly, in 2010

Reuters discovered the information: The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...

Prisons in the U.S.
From Schneier on Security

Prisons in the U.S.

Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value: Over all, there are now more people under "correctional...

The Idaho Loophole
From Schneier on Security

The Idaho Loophole

Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2. Abstract: This article argues that there is a 50-square-mile swath of Idaho...

Possibly the Most Incompetent TSA Story Yet
From Schneier on Security

Possibly the Most Incompetent TSA Story Yet

The storyline: TSA screener finds two pipes in passenger's bags. Screener determines that they're not a threat. Screener confiscates them anyway, because of...

Biases in Forensic Science
From Schneier on Security

Biases in Forensic Science

Some errors in forensic science may be the result of the biases of the medical examiners: Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...

<i>Liars and Outliers</i> Update
From Schneier on Security

Liars and Outliers Update

According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account